Sciweavers

2342 search results - page 216 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
KBSE
1998
IEEE
15 years 8 months ago
From Z to BON/Eiffel
It is shown how to make a transition from the Z formal notation [3] to the Business Object Notation (BON) [4]. It is demonstrated that BON has the expressive power of Z, with the ...
Richard F. Paige, Jonathan S. Ostroff
TCBB
2011
14 years 11 months ago
Probabilistic Analysis of Probe Reliability in Differential Gene Expression Studies with Short Oligonucleotide Arrays
— Probe defects are a major source of noise in gene expression studies. While existing approaches detect noisy probes based on external information such as genomic alignments, we...
Leo Lahti, Laura Elo, Tero Aittokallio, Samuel Kas...
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 5 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
SERA
2005
Springer
15 years 10 months ago
A Design and Test Technique for Embedded Software
In recent years, embedded systems have become so complex and the development time to market is required to be shorter than before. As embedded systems include more functions for n...
Byeongdo Kang, Young-Jik Kwon, Roger Y. Lee
CORR
2006
Springer
193views Education» more  CORR 2006»
15 years 4 months ago
On the Design of Agent-Based Systems using UML and Extensions
The Unified Software Development Process (USDP) and Unified Modeling Language (UML) have been now generally accepted as the standard methodology and modeling language for developin...
Mihaela Dinsoreanu, Ioan Salomie, Kalman Pusztai